Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
Seven.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
Seven.exe
Resource
win10v2004-20240412-en
General
-
Target
Seven.exe
-
Size
139KB
-
MD5
350273e0d2e8a9ba5e37b791016112a0
-
SHA1
5bfb616dd46f67d1dcbbff55ca5917ffc1ec8b71
-
SHA256
27297bf8139bea755e9297e7e1489d827d1ee09a8e1d94a3ef96a2edb2de61ba
-
SHA512
b1e768524b4e840bd5f4163205122dd1725583245d8bfd5cbd89eb21a5fb9d33aff1b7b0ca42132b7dae469e025068ae663b3b02ad59927a558dc340141ec91b
-
SSDEEP
3072:miS4omp03WQthI/9S3BZi08iRQ1G78IVn27bSfcJd8ltw:miS4ompB9S3BZi0a1G78IVhcTct
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 4756 netsh.exe 5020 netsh.exe 2152 netsh.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini Seven.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1676 powershell.exe 1676 powershell.exe 4744 powershell.exe 4744 powershell.exe 2336 powershell.exe 2336 powershell.exe 4888 powershell.exe 4888 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1676 powershell.exe Token: SeDebugPrivilege 4744 powershell.exe Token: SeDebugPrivilege 2336 powershell.exe Token: SeDebugPrivilege 4888 powershell.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2224 2828 Seven.exe 88 PID 2828 wrote to memory of 2224 2828 Seven.exe 88 PID 2224 wrote to memory of 1676 2224 cmd.exe 90 PID 2224 wrote to memory of 1676 2224 cmd.exe 90 PID 2828 wrote to memory of 4744 2828 Seven.exe 91 PID 2828 wrote to memory of 4744 2828 Seven.exe 91 PID 2828 wrote to memory of 2336 2828 Seven.exe 99 PID 2828 wrote to memory of 2336 2828 Seven.exe 99 PID 2828 wrote to memory of 4888 2828 Seven.exe 103 PID 2828 wrote to memory of 4888 2828 Seven.exe 103 PID 2828 wrote to memory of 2184 2828 Seven.exe 105 PID 2828 wrote to memory of 2184 2828 Seven.exe 105 PID 2184 wrote to memory of 4756 2184 cmd.exe 107 PID 2184 wrote to memory of 4756 2184 cmd.exe 107 PID 2828 wrote to memory of 3908 2828 Seven.exe 108 PID 2828 wrote to memory of 3908 2828 Seven.exe 108 PID 3908 wrote to memory of 5020 3908 cmd.exe 110 PID 3908 wrote to memory of 5020 3908 cmd.exe 110 PID 2828 wrote to memory of 3424 2828 Seven.exe 113 PID 2828 wrote to memory of 3424 2828 Seven.exe 113 PID 3424 wrote to memory of 2152 3424 cmd.exe 115 PID 3424 wrote to memory of 2152 3424 cmd.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\Seven.exe"C:\Users\Admin\AppData\Local\Temp\Seven.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c powershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"2⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-MpPreference -DisableRealtimeMonitoring $true"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ExecutionPolicy Bypass -Command "Copy-Item -Path '' -Destination 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'; if ($?) { 'Success' } else { 'Failure' }"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ExecutionPolicy Bypass -Command "Copy-Item -Path '' -Destination 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'; if ($?) { 'Success' } else { 'Failure' }"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ExecutionPolicy Bypass -Command "Copy-Item -Path '' -Destination 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'; if ($?) { 'Success' } else { 'Failure' }"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c netsh advfirewall firewall add rule name="Open Port 420" dir=in action=allow protocol=TCP localport=4202⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Open Port 420" dir=in action=allow protocol=TCP localport=4203⤵
- Modifies Windows Firewall
PID:4756
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c netsh advfirewall firewall show rule name="Open Port 420"2⤵
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall show rule name="Open Port 420"3⤵
- Modifies Windows Firewall
PID:5020
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c netsh advfirewall firewall add rule name="Open Port 1025" dir=in action=allow protocol=TCP localport=10252⤵
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="Open Port 1025" dir=in action=allow protocol=TCP localport=10253⤵
- Modifies Windows Firewall
PID:2152
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82